W3C DID-based trust infrastructure for AI agents. Verifiable Credentials, immutable audit anchoring, and x402 micropayments — built on open standards, anchored immutably.
MolTrust is a trust infrastructure platform for AI agents. It issues W3C Verifiable Credentials to AI agents via a Model Context Protocol (MCP) Server, anchors every credential cryptographically on the public ledger, and exposes REST API endpoints that allow agents and services to verify agent identity in real time. MolTrust is operated by CryptoKRI GmbH, Zürich, Switzerland.
AI agents are increasingly autonomous — they transact, delegate, and make decisions without human oversight at every step. No standardized trust layer exists to answer the basic question: who is this agent, and can it be trusted? MolTrust answers that question with cryptographic certainty, using open standards that any system can verify independently.
MolTrust is built exclusively on open, ratified standards. Credentials are verifiable by any W3C-compliant resolver — no vendor lock-in, ever.
The full issuance flow — from API call to on-chain anchor — completes in under 3 seconds.
An AI agent sends a request to a MolTrust endpoint, e.g. POST /vc/skill/issue, with its DID and the capability to certify.
MolTrust runs 8 automated checks — endpoint responsiveness, rate limiting, auth handling, error leakage, DID resolution, schema compliance, and more.
The agent pays $1–$5 USDC via the x402 protocol on a public ledger. No pre-registration, no subscription, no API key required.
MolTrust issues a signed W3C Verifiable Credential, anchors a SHA-256 hash on Base mainnet, and returns the credential with a BaseScan transaction link.
Verifiers call GET /skill/verify/:hash or resolve the DID with any W3C-compliant resolver. No dependency on MolTrust infrastructure.
MolTrust implements a complete trust stack. Each layer builds on the one below — from identity to non-repudiation.
Every agent interaction produces an IPR: a SHA-256 hash of the output + agent DID + timestamp + confidence score. IPRs are batched into a Merkle tree and anchored as a single Base L2 transaction — cost-efficient and independently verifiable.
An aeoess agent processes a transaction. The output hash is submitted as an IPR via POST /vc/ipr/submit. The receipt includes the Merkle proof for independent verification.
VCOne verifies a credential chain. The verification result + delegation path are hashed and submitted as an IPR. Any auditor can verify VCOne's action occurred at the claimed time.
When MolTrust issues a VC, the credential hash becomes an IPR. The Merkle batch transaction proves issuance time, preventing backdating or credential tampering.
Each vertical ships with its own Verifiable Credential schema, REST endpoints, and MCP tools. The table below updates automatically when new verticals are added to the PORTFOLIO config.
| Vertical | Credential Type | Key Capability | Page |
|---|
/skill/audit, /agent/score-free/:addr, /health, and all schema endpoints. Paid endpoints cost $1–$5 USDC per call via x402. No subscription or account required — agents pay per use.CryptoKRI GmbH exists since 2018 — a shared vehicle for technical projects at the intersection of cryptography, identity, and distributed systems.



Issue your first Verifiable Credential in minutes. Free audit endpoint, no account required.